Static task
static1
Behavioral task
behavioral1
Sample
cdd7cdde83e28de7335c2c41ce64e084be4e5f02dd4b2d65e938b8bdfaeca505.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cdd7cdde83e28de7335c2c41ce64e084be4e5f02dd4b2d65e938b8bdfaeca505.exe
Resource
win10v2004-20230915-en
General
-
Target
cdd7cdde83e28de7335c2c41ce64e084be4e5f02dd4b2d65e938b8bdfaeca505
-
Size
6.2MB
-
MD5
e891364dc1ad2e3272487c778cac3219
-
SHA1
cfa81c0c59166f707f3a7099d6db22fc3efdbf47
-
SHA256
cdd7cdde83e28de7335c2c41ce64e084be4e5f02dd4b2d65e938b8bdfaeca505
-
SHA512
6e155bf025dd64c1f38a390983ce0cc4dc5d5c7f84039a4f05cb4d06ed22095308637c770968477557a57f40ee96fb93163d543e5a3e3a222c2751724dca50c4
-
SSDEEP
98304:kJvUr3P45pcnmsarDgggggggggggg8HDgXkkkkk4k4ZG+J:kJvk45p8Mkkkkk4k4Z1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cdd7cdde83e28de7335c2c41ce64e084be4e5f02dd4b2d65e938b8bdfaeca505
Files
-
cdd7cdde83e28de7335c2c41ce64e084be4e5f02dd4b2d65e938b8bdfaeca505.exe windows:5 windows x86
333645c46f81e826edcd2f6979a86c21
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel_4_0_pe_server
psGetPermission
psInitProgramArgs
psGetOemNumber
mfc90u
ord2612
ord2610
ord2628
ord2640
ord2617
ord2633
ord2638
ord2621
ord2623
ord2625
ord2619
ord2635
ord2615
ord971
ord967
ord969
ord965
ord960
ord5683
ord5685
ord6466
ord1728
ord4702
ord5154
ord3743
ord5653
ord4603
ord6800
ord5512
ord374
ord5602
ord4664
ord1492
ord4345
ord1751
ord1754
ord6408
ord3353
ord1675
ord1809
ord1810
ord5324
ord5167
ord4631
ord5632
ord4000
ord2695
ord1333
ord1314
ord4516
ord4543
ord4530
ord6579
ord5008
ord744
ord5182
ord524
ord1533
ord1137
ord1108
ord2630
ord2069
ord4682
ord4211
ord1098
ord286
ord2208
ord4448
ord4423
ord6801
ord4173
ord6803
ord4747
ord2251
ord2206
ord6035
ord4179
ord1048
ord5548
ord6741
ord5830
ord4213
ord2087
ord3217
ord5674
ord5676
ord2447
ord4347
ord4996
ord5680
ord5663
ord6018
ord2771
ord2983
ord3112
ord4728
ord2966
ord3115
ord2774
ord2893
ord2764
ord4080
ord4081
ord4071
ord2891
ord4348
ord4905
ord4681
ord3670
ord589
ord813
ord794
ord4967
ord4043
ord6091
ord1353
ord1354
ord2106
ord296
ord2537
ord909
ord2375
ord2368
ord1641
ord6802
ord4174
ord6804
ord3682
ord5404
ord6376
ord3226
ord1442
ord5625
ord2139
ord1792
ord1791
ord1727
ord5650
ord3140
ord2597
ord4910
ord1183
ord600
ord3543
ord367
ord6183
ord639
ord3515
ord636
ord3486
ord801
ord2074
ord1272
msvcr90
__setusermatherr
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__CxxFrameHandler3
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
memset
_wcsnicmp
wcslen
wcscat
wcscpy
_wcsicmp
kernel32
Process32NextW
CloseHandle
CreateMutexW
GetCommandLineW
CreateToolhelp32Snapshot
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
CreateProcessW
GetModuleFileNameW
FindFirstFileW
GetLastError
user32
EnableWindow
FindWindowW
KillTimer
SetTimer
InvalidateRect
GetClientRect
IsIconic
PostMessageW
SendMessageW
DrawIcon
LoadBitmapW
GetSystemMetrics
MessageBoxW
GetWindowTextW
EnumWindows
GetWindowThreadProcessId
GetWindow
IsWindowVisible
LoadIconW
gdi32
BitBlt
CreateCompatibleDC
GetObjectW
CreateBitmap
shell32
CommandLineToArgvW
comctl32
ord17
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6.2MB - Virtual size: 6.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ